Want to know more about CyberHive Trusted Cloud?

Book a Demo

Cyber-security professionals must rethink their counter-attack

It’s hardly surprising that IT security has become a high priority for organisations.

The Bank of England has revealed that cyber-attacks were the joint second most cited risk to the stability of the UK financial system with cyber-attacks increasing to a record high of 62 percent¹.

Most cyber-attacks originate from human errors within an organisation, such as an employee opening a malware-laden phishing email, or as the result of some deceptive social engineering on the part of the attacker to infiltrate malicious code inside the defences.

Most standard cyber-defences, such as firewalls and penetration testing, serve to secure the systems from external attack. Anti-virus is used by most companies, but its effectiveness is minimal in the defence against the increasingly sophisticated and bespoke cyber-attacks that can go undetected for months.

Security professionals need to change their mindset to counter these disastrous attacks. They need to carefully explore the options that can safeguard a company from damage caused by human error.

IBM’s 2017 Cost of Data Breach Study: United Kingdom² revealed it took an average of 168 days to identify a data breach and 67 days to contain it.

New technologies can detect malware before it does any damage. If the mean time to identify malware (MTTI) is less than 100 days, the average cost to identify the data breach was £1.98 million. However, if it’s greater than 100 days, the cost rises to £2.97 million.

Reducing the response time and containing a breach must become a critical priority. The rising costs of data breaches are only set to increase with GDPR in place, not to mention the severe reputational damage.

CyberHive’s Trusted Cloud is the new standard in cyber-security. This combination of hardware-based cryptography and whitelisting technology protects servers from all unauthorised activity and malware in a way that conventional solutions simply can’t match.
Designed specifically for banks, financial institutions and governments, this cloud-based solution is the only of its kind to employ the Intel Trusted Platform Module (TPM) chip which is already installed on server motherboards. The chip is a dedicated microcontroller, impervious to hacking and designed to secure hardware through integrated cryptographic keys.

Existing solutions such as Trusted Cloud are vital to financial organisations that are targeted on a daily basis as the sophistication levels of hackers continues to rise. It’s critical that banks and financial service businesses know about the breach in a matter of minutes or hours, not days.

Sources:
¹ https://www.bankofengland.co.uk/systemic-risk-survey/2018/2018-h1
² 2017 Cost of Data Breach Study: United Kingdom by IBM Security and Ponemon Institute (June 2017).

Categories

Other Insight Articles

  • CyberHive wins Best Use of Technology award

    We are thrilled and delighted to have won the “Best use of Technology of the Year Award” at the Thames Valley Chamber of Commerce Annual Business Awards 2019. Huge thanks to the Chamber...

    Find out more
  • Detecting Data Breaches

    COO of CyberHive, Alan Platt, talks about some of the tools and techniques cyber criminals are using to gain access to your company data and systems. Learn more about the best practices in cybersec...

    Find out more
  • CyberHive Trusted Cloud Demonstration

    If you would like to know more about Trusted Cloud by Cyberhive, take a look at the following video which gives a short introduction to the technology underpinning our world-class cybersecurity sol...

    Find out more
logo

We are thrilled and delighted to have won the ''Best use of Technology of the Year Award'' at @TValleyChamber Annual Business Awards 2019. @TVCCAwards
Huge thanks to the Chamber for organising such a fantastic evening and being amazing hosts.

Contact Us

Please fill in the details below to get a 2 week demo of
CyberHive's cloud platform technology

[recaptcha]